Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Sneak analysis

A sneak circuit or path is an unintended energy route, which can allow an undesired function to occur, prevent desired functions from occurring, or adversely affect the timing of functions. Sneak circuit analysis or sneak analysis is performed to identify ways in which built-in design characteristics can either allow an undesired function to occur or prevent desired functions from occurring. Even though most sneak circuits and most sneak circuit analysis... [Pg.262]

The sneak circuit analysis (SCA) (also known as sneak analysis) is a system safety analytical technique used to identify and evaluate the different possible ways in... [Pg.175]

Buratto, D. L. and Goody, S. G. June 1982. Sneak Analysis Application Guidelines. [Pg.265]

Clardy, R. C. 1977. Sneak analysis An integrated approach. International System Safety Conference Proceedings, 1977. New York System Safety Society. [Pg.265]

Sneak analysis is a technique for identifying latent hazards which arise from design or systematic errors but not from component caused failures (Whetton and Armstrong, 1994, lECffSO 31010, 2009). [Pg.706]

Whetton, C. Armstrong, W. 1994. Sneak analysis of batch processes. Journal of Hazardous Materials, 38, 257-275. [Pg.708]

Whetton, C.P. 1992 Thermohydraulic sneaks. In Proc. Sneak Analysis Workshop. ESA-WPP033, European Space Agency, ESTEC, Noordwijk, The Netherlands. [Pg.54]

In hardware, sneak analysis provides a powerful alternative to functional analysis. In the variant which h b used, sneak oath analysis, the tracing procedure starts by identifying "targets", that is items of hardware which can cause an accident if activated at the wrong time, or items of hardware which must operate in order to ensure safefy. [Pg.73]

Bougnol C., Dore B., Taylor J.R. Development of Sneak Analysis procedures and Computer tools. ESREL conference, Munich 1993, Elsevier pub. [Pg.76]

HAZOP/FAULTTREE ANALYSIS PROCESS/ SNEAK ANALYSIS... [Pg.77]

Sneak analysis Looks for unintended paths (flows) within an electrical system. [Pg.278]

Although risk analysis of new facilities is required by Ref. 39, the method of conducting the analysis is left quite open. The reference suggests fault hazard analysis, fault tree analysis, or sneak circuit analysis. Ref. 41 is an example of a thorough hazards evaluation and risk analysis for a new facility at Radford Army... [Pg.46]

The recommended techniques for preliminary hazard analysis are energy trace and barrier analysis (ETBA) and failure modes and effects analysis (FMEA). Recommended techniques for system and subsystem hazard analyses are FMEA, fault tree analysis (FTA), common cause analysis, sneak circuit analysis (for electrical, electronic, and some hydraulic or pneumatic circuits) and, of course, software hazard analysis for software. [Pg.68]

Based on the results of the PHA, recommendations made by 30% review boards, and guidance provided in the system safety program plan, detailed hazard analyses are made of specified (critical) subsystems. The techniques for these SSHAs are as outlined in the system safety program plan or as selected by the SSWG. Failure modes and effects analysis (FMEA) and/or fault tree analysis (FTA) are generally the techniques of choice. Software hazard analysis, common cause analysis, and/or sneak circuit analysis may also be appropriate. [Pg.98]

An important feature of sneak circuit analysis is that the sneak paths being investigated are not the result of a component failure. They are rather the result of the circuit design. The sneak paths may show up only on rare occasions when the switches (or valves) in the circuit are in a unique configuration. [Pg.263]

Sneak circuit analysis is usually inductive and can be very difficult to perform without the software to aid in producing network trees and other graphics. Much of this software is proprietary, and a large portion of the sneak circuit analysis work done to date has been accomplished by large aerospace and weapons contractors (notably Boeing and General Dynamics). [Pg.263]

The most common approach to sneak circuit analysis involves visual clues found by comparing circuits with the five basic topographs shown in Figure 20-1. Nearly every circuit can be broken down into combinations of these topographs. [Pg.263]

Successful sneak circuit analysis requires a skilled analyst and great care. Unfortunately, sneak circuit analysis is frequently performed with... [Pg.263]

Most sneak circuit analysis has been done by one or two large defense and aerospace contractors. Why ... [Pg.272]

To illustrate this point, this chapter addresses two system safety analytical methods that have been developed as a result technological improvements the sneak circuit analysis and the software hazard analysis. Each is briefly discussed here to demonstrate its applicability and utility in the practice of industrial safety and health. [Pg.175]

Basically, the ways in which sneaks can occur and the potential results of these events can be grouped into four primary categories, as indicated in Table 15.1. Each type, if possibly applicable to a specific system, requires separate analysis. [Pg.176]

Although software hazard analysis is a separate system safety teclmique and is discussed later in this chapter as such, a review of compiler and/or assembly languages as well as any applicable system reference manuals and interface control specifications is advisable during the SCA. Sneak risks have been discovered as a result of improper or inappropriate software command initiatives. [Pg.177]

Figure 15.1 Sample sneak circuit analysis worksheet. Figure 15.1 Sample sneak circuit analysis worksheet.
The system safety analysis techniques known separately as sneak circuit analysis and software safety analysis have been developed in an effort to address these concerns over system safety and reliability assurance. Although various types of sneak hazards can be identified by analysis, and a variety of software hazard analysis techniques are commonly used, each method is concerned primarily with the same essential objective explained throughout this text hazard risk elimination or reduction to acceptable levels. [Pg.182]

CASCA Computer-aided sneak circuit analysis... [Pg.189]


See other pages where Sneak analysis is mentioned: [Pg.306]    [Pg.212]    [Pg.72]    [Pg.74]    [Pg.78]    [Pg.306]    [Pg.212]    [Pg.72]    [Pg.74]    [Pg.78]    [Pg.140]    [Pg.218]    [Pg.311]    [Pg.872]    [Pg.336]    [Pg.262]    [Pg.263]    [Pg.261]    [Pg.1]    [Pg.12]    [Pg.175]    [Pg.176]    [Pg.177]    [Pg.178]    [Pg.191]   
See also in sourсe #XX -- [ Pg.278 ]




SEARCH



© 2024 chempedia.info